PROTECT YOUR FILES AND FOLDERS WITH COOL TOOLS SAVE YOUR DATAFROM BEING STOLEN AND MISUSED KEEP A SAFE DISTANCE FROM HARDWARETHREATS BE ALERT AND STAY SAFE ON THE INTERNET Protect your home network » Secure your web browser» Monitor USB drives Supplement to CHIP November 2009 SECURE YOUR WORLD OF TECHNOLOGY
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
into our systems without our knowledge. Attacks like
worms, viruses and Trojans are generally pre-coded
and stored at some point in a website or anywhere on
the Internet. These can be mailed to us, and to several
other targets at a time as an attachment, which, on
clicking, can penetrate our systems.
However, though these are the most common
attacks, we also have some others. All o these are
mentioned in the ollowing points:
WORMS, VIRUSES AND TROJANS: As mentioned
earlier, these programs are pieces o code that aect
some part o our operating system. Worms are known
or replication; viruses cause direct attacks on our
data by deleting, altering or adding data without our
permission. Trojans reside as harmless entities which
later cause problems by picking up our sensitive
inormation like logins and passwords.
DOS ATTACKS: One o the most common attacks
is the DoS (Denial o Service) attack. In this case,
certain or all components o your system are made
unavailable to you. For example, your PC will be
'pinged' over and over again so as to congest your
network tra c. This will deny you using your own
PC over the network. The most common targets
or attackers oten include blocking a certain web
portal or component rom being used. Besides being
annoying, this can also lead to some serious downtime
in your work. Even worse, attackers can ood the
victim's bandwidth with requests rom multiple
systems. This kind o attack is called DDoS (Distributed
Denial o Service). Certain Trojans can also be used to
execute this kind o attack.
BROWSER HACKS: Certain websites and applications
have scripts like JavaScript and ActiveX controls. These
can be used to pick up inormation like login details,
browsing history, etc. and display it to unauthorized
personnel. However, the good news is that there are
means to block these components on your browser.
Most browsers provide you with an option to block
these attacks. There are other harmul scripts that
can take you by surprise. These appear to be helpul
links and ads on the site that tempt you to click on
them. On clicking, they set to work. So make sure that
you click only on relevant links and objects on your
browser so as to keep away rom harmul scripts such
as these. These links can also be displayed on public
orums as HTML tags and ash ads.
EMAIL THREATS: Emails are the easiest way to get a
fle rom one end to another. The sad part is that it is
used to get some rather fshy fles across sometimes.
Make sure that you do not download fles that have
been sent as attachments rom sources that you do
not know. It can be a virus or another harmul fle that
AVG, Kaspersky, McAfee and Norton are the most common anti-viruses programs used as a first leveldefense. Though they are capable of functioning on their own, it is also very important to update them
regularly to keep them up-to-date with the latest threats.
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
Netbus are easy-to-use tools or those seeking an
entry into a computer network. Home networks are
eeding grounds or such attackers. They can even
dig into administrative systems and change certain
confgurations and use them to their advantage.
The above mentioned attacks are just broader classes
o more sophisticated actions taken by attackers to
penetrate a system.
HOW DO WE PROTECTOURSELVES?
The ollowing are some basic precautionary steps to
keep away rom network based attacks.
UPDATE ANTI-VIRUS APPLICATIONS: Make sure that
you update your anti-virus suite oten so as to remain
up-to-date with the latest threats on the network and
the Internet.
ENSURE STRONG ADMINISTRATIVE RIGHTS: I
you have a network administrator, make sure that
his system is capable o handling the privileges well.
Ensure that your system is saely shielded rom all the
harmul fles on the network.
USE FIREWALLS TO BLOCK PORTS: Firewalls are
great tools to block certain ports rom being accessed.
DO NOT USE UNKNOWN FILES AND APPLICATIONS:
Avoid using fles and applications that have come to
you rom unknown sources. I they arrive by email, do
not download or open them.
MAKE FILE EXTENSIONS VISIBLE: By deault,
Windows disables the fle viewing o fle extensions.
However, to avoid attacks, it is necessary to see what
ormat a fle actually belongs to. I you use Windows
XP then open 'My Computer'. In that click 'Tools |
Folder Options'. Click the 'View' tab. Uncheck the 'Hide
extensions or known fle types' checkbox. However,
this may not make all the extensions visible.
DISABLE JAVA AND ACTIVEX SCRIPTS: As seen
earlier, scripts like ActiveX can cause executable
viruses to enter your system once they are installed.
Hence disable them i possible.
BACKUP YOUR DATA: It is always critical to maintain
backup copies o your data so that they can be
recovered in case o loss.
TURN YOUR PC OFF WHEN NOT IN USE: There is no
way that a switched o PC can give away any data or
be attacked. Hence, keep it o i you are not using it. I
you eel that there is something absolutely dangerous
on your network then unplug the network cable ater
consulting your administrator.
KEEP A BOOT DISK FOR EMERGENCIES: The worst
case scenario can be your computer's system fles
being corrupted. Hence it is important to make a boot
disk to recover it at such times.
Firewalls are often bundled with anti-virus sui tes but can be found as st andalone applications as well.They help you keep your PC safe from notorious access points on the network. You need to understand
the concept of using logical ports on your computer before you configure Firewalls.
Protect your fundsfrom being phishedPhishing is a technique through which passwords and other conidential details are stolen in order to hack into bank accounts and steal money rom victims. By ollowing these simple tricks, learn how to protect your money during online transactions.
B Y K A M A K S H I S
1USING THIRD PARTY
APPLICATIONS
WHILE there are several third party applications which help
you protect your interests while purchasing and perorming
transactions online, there are also several browser specifc
add-ons that you can enable within your browser. One such
tool is the 'Netcrat Toolbar', which is available only or the
Internet Explorer and Mozilla Fireox browsers as o now. These
applications help you to report raudulent sites, and help you
generate lists o the phishiest web hosts, worldwide.
2READ BETWEEN THE LINES
MOST email service providers today have a strong
in-built spam guard. Yet, i a scam mail still manages to make
its way to your inbox, may sure you read the contents twice or
thrice. Every credit company or bank has a specifc pattern o
correspondence. I you fnd anything out o the ordinary or see
too many spelling mistakes, it is advisable to check with your
bank beore responding to such emails. I you fnd such emails
fshy, delete them without a second thought.
3CHECK THE SENDER NAME AND
ADDRESS TEXT
WHENEVER you get an email rom a clean source, the sender's
name would appear in your inbox. I you fnd an email ID
instead o the sender's name, you can delete the email without
even opening it. Similarly, i the email is addressed to an ID
Protect your laptop while on the goOne reason people choose laptops over desktop systemsis portability. However, with portability come threats likethet, natural hazards and other external problems. Hereare some helpul tips to make sure that your laptop issae while you're outdoors.
B Y G A R E T H M A N K O O
1USE TRACKING AND CALL BACK
APPLICATIONS
TO help you in times o need, in this case, in thet, we have
scores o applications that can ensure that you have some hope
o your laptop being returned to you ater being burgled. To do
so, these programs use techniques like sending inormation o
the laptop's current location; this helps in tracing them. Other
services include call-back applications that call the owner rom
the laptop, thus giving away its location. Some notable tools
include SecureIT, Stealth Signal and CompuTrace.
2USE CABLE LOCKS
CABLE locks are quite an obvious choice or those who
eel that their laptops are not sae in an o ce or a caé. These
are used especially in cases where you need to leave your laptop
unattended or charging. Most o the laptops available these
days come with a Universal Security Slot (USS). This slot is used
to attach a cable lock or a laptop alarm. These devices aren't
expensive and can keep away small-time thieves.
3USE DOCKING STATIONS
DOCKING stations are another great means o securing
your laptops in your absence. While in an airport, hotel, caé,
train station, a client's o ce or any other place that would
require you to get your laptop out o its bag in order to work on
it, you could always use these to ensure that your laptop is just
where you put it when you let the place. O course, this means
o protection is eective only or a temporary period. Given a
bit more time, any thie can get away with your laptop and your
docking station to top it o.
4PERMANENTLY TAG YOUR LAPTOP
MAKING an impression o your name and the name o
the organization that you work or can pay o in times o thet or
loss. You can get it embedded or engraved on your laptop rom
a proessional studio or use a label or a sticker with your personal
inormation. I you eel that these measures would be too crude
and would mar the sleek look o your laptop then you can invest
some more money and go in or tamper resistant 'commercial
asset tags'. Since these are made o metal there's little chance o
them peeling o or tearing. This will also help in recovery i you
leave your laptop lying somewhere. Many people also resort to
putting their address and contact number on the laptop.
5USE SCREEN GUARDS TO HIDE
YOUR DISPLAY
SOMETIMES the inormation we're dealing with on our laptops
is extremely crucial and cannot be shared with others. Such
inormation like bank transaction details, sensitive letters and
notes and other such personal inormation have to be protected
rom those who would like to use it or all the wrong reasons. To
avoid such attacks on your sensitive inormation we have screen
guards. These cover your screen rom the sides and above so that
you do not ace the problem o people peeping into your screen,
over your shoulder. Adding screen guards however, can cause
the weight o your laptop to increase and will also add to the
number o accesories that you have to carry along.
6AVOID USING LAPTOP BAGS
IT is common sense to keep the thieves rom knowing
that you have a laptop with you in the frst place. Hence, you
8 HANDS ON 10 TIPS
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
Select a user account on the
resulting screen.
Click the 'On, enorce current
settings' radio button.
Click the 'Windows Vista Web
Filter' link.
Make sure that the 'Block some
websites or content' radio button is
selected.
Click the 'Edit the Allows and Block
list' link.
Enter a website name in the
'Website address' text box.
Click the 'Block ' button to block the
website rom being viewed. You can
block any number o websites as
required.
Once done, click 'OK '.
WINDOWS VISTA
03REMOVE OLD DRIVERS
IF you've recently upgraded your
hardware and installed new drivers,
but are still experiencing some
problems, you might need to uninstall
the old drivers to avoid urther
problems.
A major problem here is that these
drivers are not visible in the Device
Manager window. In this tip we show
you how to tweak some system
settings to get rid o old drivers on
your system.
Follow these simple steps to go
about the same.
Go to 'Start | All Programs |
Accessories'.
Right-click the command prompt
and select the 'Run as Administrator'
option rom the context menu.
On the command prompt,
type in 'SET DEVMGR_SHOW_
NONPRESENT_DEVICES=1' and
hit [Enter].
To open device manager rom
command prompt, type in
'devmgmt.msc' and hit [Enter].
From the View menu, select 'Show
hidden devices' option. You will now
be able to view all hidden drivers.
Right-click the name o a driver
that is not required and select the
'Uninstall' option rom the context
menu that appears.
WINDOWS VISTA
04DISABLE AUTOPLAY
THE Autoplay option in Windows
Vista appears whenever a CD/DVD
is inserted or an external drive is
plugged in via the USB port. This
eature might be quite helpul but at
times it may even get really annoying,
especially when it aects your
normal work or i you insert optical
discs very oten. I you eel that you
no longer require the Autoplay
unction, you can disable it. Simply
ollow the steps given below.
To disable Autoplay or all devices,
go to 'Start | Control Panel'.
Under the 'Hardware and Sound '
section click the 'Play CDs or other
media automatically' link.
De-select the 'Use Autoplay or all
media and devices' check box.
To disable certain devices and to
speciy the media type click the
drop-down list (next to the media
type or device you want to disable)
and select an option as required.
Once done, click the 'Save' button to
WINDOWS XP SP2
06DISABLE WRITING TO
USB DRIVES
IF your system is being used by
multiple users, then there is a huge
possibility o data being leaked
rom your system. Data thieves can
simply plug in a USB device and copy
sensitive data.
I you're concerned about data
security, you can disable writing to USB
drives with a simple registry tweak.
To disable the writing o data to USB
drives ollow these steps:
Go to 'Start | Run', type 'regedit ' in
the text box and press [Enter].
Browse to the 'HKEY_
LOCAL_MACHINE | SYSTEM |
CurrentControlSet | Control |
StorageDevicePolicies' registry key.
Right-click anywhere on the right
pane and select the 'DWORD
(32-bit) Value' option.
Double-click the newly created key
and type '00000001' in the 'Value
data' ield.
Once done, you will have to
restart your system or changes
to take eect.
On the command prompt type SET DEVMGR_SHOW_NONPRESENT_DEVICES=1, run Device Manager, selectthe 'Show hidden devices' option from the 'View' menu and uninstall hidden drivers as required.02
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 22/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
2 HANDS ON TIPS & TRICKS
WORD 2003 / 2007
01TRACKING CHANGES INA DOCUMENT
IF your data is critical and you want to
ensure that you give restricted access
on the document, you can either
control ormatting or editing changes.
To do so using Word 2007:
Open the document on which the
restriction needs to be applied.
Go to the 'Review ' tab.
Click the 'Protect Document ' option
appearing under the 'Protect' group
at the end o the tab.
Select the 'Restrict Formatting and
Editing' option under the 'Restrict
Reviewing Options' section o the
drop-down menu that appears.
Check the 'Limit ormatting to a
selection o styles' option appearing
under the 'Formatting restrictions'
section o the dialog box.
Click the 'Settings ' link and check
or uncheck the required option.
Click 'OK ' to continue.
Next, check the 'Allow only this type
o editing in the document:' option
appearing under the
'Editing restrictions' section o the
dialog box.
Select the 'Tracked changes ' option
rom the drop-down list.
Click the 'Yes, Start Enorcing
Protection' button to enorce
restriction settings.
I you are using Word 2003, carry out
the ollowing steps:
Open the document on which a
restriction needs to be applied.
Go to the 'Tools | Protect
Document…' menu command.
The 'Restrict Formatting and
Editing' panel appears on the right
side o your Word window.
Once you see the 'Restrict
Formatting and Editing' panel
simply ollow the steps as described
above (while using Word 2007).
WORD 2003 / 2007
02PROTECTING TABLE
VALUES
IF you are not comortable with
creating orms in your document, and
yet need to take user inputs you can
use tables instead. All you need to do is
create tables with cells containing fxed
values and editable values. To do so
using Word 2003:
Open the document to which
restriction needs to be applied.
Go to 'Table | Insert | Table ' menu
command.
Create a table by setting the
required number o rows and
columns.
Next, ill out the details that you
want to keep ixed.
Next, go to 'View | Toolbars | Forms '
to activate the 'Forms' toolbar.
Place your cursor on a cell where
you want the contents to be
editable.
Click the 'Text Form Field ' option
rom the 'Forms' toolbar.
Repeat the above steps or all the
editable cells.
Once done click the 'Protect Form '
option rom the 'Forms' toolbar.
Now no part o your document can
be edited except the speciied cells.
I you plan to use Word 2007 instead,
carry out the ollowing steps:
Open the document.
Go to the 'Insert ' tab.
Click the 'Table ' option appearing
under the 'Tables' group o the tab.
Click the 'Insert Table ' option rom
the drop-down menu.
Create a table by setting the number
or rows and columns.
Next, ill out the details that you
want to keep ixed.
Place your cursor on a cell that you
want to leave as editable.
Go to the 'Developer ' tab.
Click the 'Legacy Tools ' option under
the 'Controls' group.
Select the 'Text Form Field ' option
rom the drop-down list.
Repeat the above steps or all the
editable cells.
Next, click the 'Oice ' button and
click the 'Word Options' button
appearing at the oot o the drop-
down list.
Click the 'Customize ' option rom
the 'Word Options' dialog box.
Select the 'All Commands ' option
rom the 'Choose commands rom:'
drop-down list.
Scroll down and select the 'Lock '
command. Click 'Add >>' to add it to
the 'Quick Access Toolbar'.
Click 'OK ' to continue.
Click the 'Lock ' button on the
'Quick Access Toolbar' to secure
your table.
If you click the 'Recommended Minimum' button only the recommended settings will be checked, the restwill be automatically unchecked.01
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
WORD 2003 / 2007
03PROTECT SECTIONS OF A
DOCUMENT
YOU may have created reports where
you need another reviewer to enter
details and not tamper with certain
sections o the document. For doing
this certain parts o the document
should be locked while some parts
should be let open or editing. To
do so using Word 2007, carry out the
ollowing steps:
Open the document to which
restriction needs to be applied.
Select the data which needs to be
set as editable.
Go to the 'Page Layout ' tab.
Click the 'Breaks ' option appearing
under the 'Page Setup' group o the
tab.
Select the 'Continuous ' option rom
drop-down list.
Create as many section breaks as
required.
Then, go to the 'Review ' tab.
Click the 'Protect Document ' option
appearing under the 'Protect' group
at the end o the tab.
Check the 'Allow only this type o
editing in the document:' option
appearing under the 'Editing
restrictions' section.
Select the 'Filling in orms ' option
rom the drop-down list.
Click the 'Select Sections ' link that
appears below the drop-down list.
Select the section (or sections)
you want to lock in the 'Section
Protection' dialog box
Click 'OK ' to continue.
Click the 'Yes, Start Enorcing
Protection' button.
Set a password i required.
I you are using Word 2003 instead,
carry out the ollowing steps:
Open the document to which
restriction needs to be applied.
Select the data which needs to be
editable.
Go to the 'Insert | Breaks… ' menu
command.
Check the 'Continuous ' option rom
'Break' dialog box.
Create as many section breaks as
required.
Next, go to the 'Tools | Protect
Document…' menu command.
The 'Restrict Formatting and Editing '
panel appears on the right-side o
your Word window.
Check the 'Allow only this type o
editing in the document:' option
appearing under the 'Editing
restrictions' section.
Now simply ollow the steps as
above (while using Word 2007).
WORD 2003 / 2007
04PASSWORD PROTECTING
DOCUMENT
IF you are working with confdential
data, it is recommended that you
password protect such fles. Word lets
you create separate passwords or
opening and editing fles. Here's how:
Click the 'Oice ' Button.
Click the 'Save As ' option rom the
drop-down list.
Click the 'Tools ' option on the 'Save
As' dialog box.
Click 'General Options ' rom the
drop-down list.
Set the required passwords as per
your requirements. Click 'OK'.
You can set the macro security settings directly from this dialog box apart for setting passwords and making
files read-only.04
Once you lock the file for editing, the sections other than those specifically exempted will not be editable,unless there are forms controls in that section. 03
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 24/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
4 HANDS ON TIPS & TRICKS
EXCEL 2003 / 2007
01PASSWORD PROTECTINGDOCUMENT
EXCEL helps you create separate
passwords or opening and editing
fles, but unlike Word, you cannot
modiy the macros settings rom this
option directly. Here's how:
Click the 'Oice ' Button in Excel.
Click the 'Save As ' option.
Click the 'Tools ' option on the 'Save
As' dialog box.
Click 'General Options ' rom the
drop-down list.
Set the required passwords.
Check the 'Read-only
recommended' option to make your
ile read only by deault.
Click 'OK ' to save the settings.
EXCEL 2003 / 2007
02UNLOCKING SELECTED
CELLS
IF you are not comortable with
creating orms in your document, and
yet need to take user inputs you can
create a semi-locked range o cells. All
you need to do is create a range o cells
containing fxed values and editable
values. In Excel, the cells are locked
by deault, but the users can still edit
their content unless you protect the
worksheet as explained below. Carry
out the ollowing steps or Excel 2003:
Open the workbook to which
restriction needs to be applied.
Next, ill out the details that you
want to keep ixed in the cell range
o your choice.
Select the required cell range that
can be edited.
Go to the 'Format | Cells '.
Go to the 'Protection ' tab o the
'Format Cells' dialog box.
Uncheck the 'Locked ' option or the
selected range o cells.
Next, go to the 'Tools | Protection |
Protect Sheet'.
Check the 'Protect worksheet and
contents o locked cells' option in
the 'Protect Sheet' dialog box.
Next, check 'Select unlocked cells '
option rom the 'Allow all users o
this worksheet to:' section.
Type a password i required.
Click 'OK ' to continue.
I you plan to use Excel 2007 instead,
carry out the ollowing steps:
Open the workbook.
Fill out the details that you want to
keep ixed in the cell range o your
choice.
Select the required cell range that
can be edited.
Go to the 'Home ' tab.
Click the 'Format ' option appearing
under the 'Cells' group o the tab.
Select the 'Lock Cell ' option rom the
drop-down list to unlock the cells.
Next, click the 'Format ' option under
the 'Cells' group o the tab once
again.
This time select the 'Protect Sheet... '
option rom the drop-down list to
unlock the cells.
Check the 'Protect worksheet and
contents o locked cells' option in
the 'Protect Sheet' dialog box.
Next, check the 'Select unlocked
cells' option rom the 'Allow all users
o this worksheet to:' section o the
dialog box.
Type a password i required.
Click 'OK ' to continue. Your
worksheet is ready to be used.Setting a password to unprotect your worksheet makes the data more safe and secure. Make sure that you
pick a password that is long and hard to guess.02
MICROSOFT EXCEL
01You can auto create backups for the file by making sure that you check the 'Always create backup' option onthe 'General Options' dialog box
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
password always makes us scratch our
heads, and then comes the problem
o remembering these passwords
over a period o time. This problem
arises because most o us have multiple
IDs (or logins) on dierent sites, and
with all the hype o keeping away
rom using the same password in
multiple sites.
There is however something that
can help us out o this mess without
asking or much. It's called 'LastPass
Password Manager'.
It is a Mozilla Fireox add-on
that supports versions rom 2.0 to
3.7. Follow these steps to install
and confgure your passwords with
LastPass.
Visit https://addons.mozilla
.org/en-US/freox/addon/8542.
Click the 'Add to Fireox (Windows)'
button.
The installation dialog box will
open up. Once the installation is
complete, restart Fireox or the
changes to take eect.
Click the logo on the ar right corner
o the navigation toolbar. It can be
ound on the right o the search
box. It is shaped like a black square
with a white password character
embedded on it. You will be asked
or your email address and or a
master password.
Click the 'Create an account' link
on the 'LastPass Master Login'
dialog box.
This will launch the setup window.
Select your language o choice and
click 'Create an account'.
On the next orm enter the details
that are asked like your email
address, master password and
other ields. Your master password
will help you take control o all
the inormation you share with
LastPass, such as passwords o
various sites that you sign up or.
Check all the checkboxes at the
bottom, especially 'I have read and
agree with the terms o service
and privacy statement' and 'I
understand that my encrypted data
will be sent to LastPass'.
As you ill in the master password,
you will notice that the bar
below the ield is illed with color
indicating the strength o the
password. The strongest password
is that which is illed with color.
Click 'Create an Account' again to
proceed.
Just to make sure that you do not
orget the master password that
you set earlier, LastPass will ask
you to reenter the password. Do
this and click 'Create an Account' to
continue.
The next options are crucial. Select
the irst radio button that lets you
choose the items that you want to
import.
Click 'Continue'.
A smaller dialog box will appear
with the list o logins that are
registered to the email address that
you had entered. Click 'Import' ater
selecting all.
Keep clicking 'Continue' on the
ollowing steps to complete the
registration process.
Once you have done this, the
completion o your registration process
will be confrmed. Make sure that you
do not share your master password
with anyone. Every time you visit a
page that requires you to log in simply
ensure that you have signed into
LastPass. The application asks you
to enter only the master password.
The rest is taken care o as your email
address and password is entered
automatically ater a brie reerence to
the application's list o log ins.
After selecting the language click 'Create an account'. You will be redirected to the next form where youhave to enter details.04
Click on the color-coded ratings bar to let other users know how safe it is to visit a site. To view all resultsclick 'View scorecard for rating details'.02
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
SanDisk Flash Drive
Windows OS
Internet Connection
WHAT YOU CAN LEARN
Securing your flash drive
Safely ejecting USB drives
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Lock up your
USB driveThere is always a chance o you losing your USBlash drives with conidential data in them. Hence,it is a good practice to lock it up with a password.Here's how you can do it using U3 LaunchPad on your SanDisk drives.
B Y K A M A K S H I S H
e m a l i L i m b a c h i y a
STEP 1
DOWNLOADING AND INSTALLING
ALTHOUGH U3 LaunchPad comes ree o cost with most SanDisk ash drives, you can stilldownload a copy o the drivers. To use the application, carry out the ollowing steps
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
MONITORING A NON-
SANDISK DRIVE
I you are using a USB drive
which is a not a SanDisk
device, you can use alternative
applications to monitor it.
One such reeware is the 'USBLocker'. To use the application,
carry out the ollowing steps:
Visit '[1] http://bytescout.
com/usblocker.html ' and
click the 'Download USB
Locker (EXE installer, direct
download link)' link.
Save the exe fle and install[2]
the application.
Go to 'Start | All Programs[3]
| Bytescout USB Locker |
Bytescout USB Locker.exe'.
Click the 'Disable Writing[4]to USB ash drives' option.
Ensure that 'Use password[5]
protection' is checked.
Type a password in the[6]
dialog box that pops up
and click 'OK'.
Click 'Enable Writing to[7]
USB ash drives' and
retype the password to
unblock your USB drive.
CHIP PLUS TIP
STEP 3
SAFELY EJECTING YOUR FLASH DEVICE
AFTER your work with the USB drive is done, you need to ensure that you unplug it saely or utureuse. To eject your USB device saely, carry out the ollowing steps:
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SKILL LEVEL
Beginner
WHAT YOU WILL NEED
SecureCrypt UE
WHAT YOU CAN LEARN
Encrypting text files
Encrypting non-text files
Using files as encryption keys
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Encrypt your
dataData encryption is a smarter way to secure data ascompared to password protecting iles. Learn how you can make your data and other iles sae usingSecureCrypt.
B Y K A M A K S H I S H e m a l i L i m b a c h i y a
STEP 1
DOWNLOADING AND INSTALLING
SECURECRYPT is a ree tool available over the Internet which enables you to encrypt text data in afle as well as data not saved in the text ormat. To download and use this application, carry out theollowing steps:
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
WHAT DOES DATA
ENCRYPTION MEAN?
Encryption is a process o
converting normal text into
what seems like a sequence
o random text also known as
cipher text. The conversion o data into cipher text requires
certain ormula known as
algorithms. There are several
algorithms available to help
with this conversion. The
amount o time taken to
encrypt the data orms the
basis o the encryption. The
Advanced Encryption Standard
(AES) was made available to
the public in around 1998 and
was used by the military. It is
a 256-bit encryption standardand can encrypt and decrypt
at a mean speed o around 36
mbps. AES-Twofsh-Serpent is
a very strong encryption and
can encrypt and decrypt only
6.6 mbps on an average. This
also depends on the system; a
aster processor will perorm
the task much aster. The RAM
is also a major actor.
REFERENCE
STEP 2
ENCRYPTING AND DECRYPTING TEXT FILES
IF you have important and confdential details in a Word document, then it is always better toencrypt the contents rather than depend on a password. A password can be cracked and the flecan be hacked into. To encrypt a text fle, carry out the ollowing steps:
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
CUSTOMIZING PDF FILES
Since the application does not
create a shortcut in5 the Start
Menu, you cannot uninstall
the application directly. You
can uninstall the application
either rom the Control Paneldirectly or rom the application
itsel. I you uninstall it rom
the application, you will
have to manually delete the
desktop shortcut. Carry out the
ollowing steps:
Start the application.[1]
Click the 'Uninstaller[2] ' icon.
Click 'Next[3] ' in the
'uninstaller' window till
you have completed the
process.
Click 'Finish[4] ' and proceedto delete the Desktop
shortcut. The application
will be uninstalled.
REPORTING BUGS
You can report these bugs with
the help o SecureCrypt UE.
Make sure you are connected
to the Internet or reporting
bugs. Once you are ready, carry
out the ollowing steps:Start the application.[5]
Click the 'Report a Bug[6] '
option on the application
window.
Your deault browser[7]
window will open with the
'Bug Report' page o the
sotware website.
Enter the required details[8]
and enter the characters
appearing in the captcha
image at the oot o
window.
Click the 'Submit[9] ' button
to log the errors.
CHIP PLUS TIP
STEP 3
ENCRYPTING AND DECRYPTING NONTEXT FILES
IF you have video fles or image fles which are not text based, it can be quite cumbersome toencrypt such fles. Also i you are not comortable remembering too many complex passwords, youcan encrypt fles by ollowing the steps mentioned below:
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
Windows XP or later
Internet explorer, Mozilla Firefox or
Google Chrome
WHAT YOU CAN LEARN
Configure browser security options
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Secure your
web browserMost popular Internet browsers come along withsecurity eatures that help you browse saely. Let’stake a look at these options and how to conigurethem accordingly.
B Y D O L W I N F E R N A N D E S H
e m a l i L i m b a c h i y a
STEP 1
CONFIGURING INTERNET EXPLORER
INTERNET Explorer 8 is Microsot's latest Internet browser. However, its predecessors too havesome common security options that can be confgured or maximum security. Let's see how to goabout it.
Run Internet Explorer and1.
press the [Alt] key to view
the menu bar.
Select 'Internet Options2. '
rom the 'Tools' menu.
Click the 'Security3. ' tab.
Under the 'Security level4.
or this zone' section, set
the slider bar to 'High'.
Click a zone, or example
'Internet'.
Click the 'Custom level5. '
button.
Scroll down until you see6.'Run ActiveX controls and
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
WHAT IS ACTIVEX?
ActiveX is basically a
technology that is used by
Internet Explorer. It allows
applications to be used by
the browser. An ActiveX
component may alreadyreside on a Windows system
or it may be provided as a
downloadable object. This
enhances the unctionality
o web browsing. On the
other hand, it may also pose
as a security threat i it's
not properly implemented.
Though it's quite useul, it
also increases the chances
o you being attacked.
Also, installing a Windows
application introduces thepossibility o ActiveX controls
being installed on the system.
Hence one should be aware
o or completely block these
applications rom being
installed through the browser.
REFERENCE
STEP 2
CONFIGURING MOZILLA FIREFOX
FIREFOX has gained popularity over the years and is being used by many. But like Internet Explorer,it comes with security options that need to be confgured or optimum security. To confguresecurity settings, ollow the steps below.
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
STEP 3
CONFIGURING GOOGLE CHROME
GOOGLE'S frst ever web browser was successully launched a ew months ago and is currentlybeing used by many. Like other browsers, Chrome also comes with security options that are notconfgured by deault. Let's take a look at some o these options and implement them accordingly.
Run Google Chrome and1.
click the wrench menu.
Select the 'Options2. '.
In the resulting dialog3.
box, click the 'Under the
Hood' tab.
Select the 'Ask where4.
to save each ile beore
downloading' checkbox
to be notiied o ile
downloads.
Click the 'Personal5.
Stu' tab.
Under the 'Passwords6. '
section, click the 'Never
save passwords' radio
button.
Under the 'Form autoill7. '
section, click the 'Never
save text rom orms'
radio button.
Click the 'Clear browsing8.
data' button.On the resulting window9.
that appears, select the
checkboxes as required.
Make sure the 'Clear saved10.
passwords' checkbox is
selected.
From the 'Clear data11.
rom this period', select
'Everything'.
Finally, click the 'Clear12.
Browsing Data' button.
WHAT ARE BROWSER
PLUG-INS?
Plug-ins are extra applications
that can be used by a web
browser. By deault most
plug-ins are not installed since
it may not be required by theuser and at the same time it
also keeps the browser light.
Most plug-ins are (by deault)
created by the browser owner
themselves. On the other hand
there are plug-ins created by
third party users to extend the
browser's unctionality. They
are similar to ActiveX controls.
The only dierence is they
cannot be executed outside
the web browser. Adobe Flash
player is an example o aplug-in. Downloading plug-ins
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
Windows XP or later
Universal Shield 4.3
WHAT YOU CAN LEARN
Password Protect files and folders
Lock Windows folders
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Protect your files
and foldersWindows operating systems do come with security eatures that keep one's system sae. But it does not include security eatures that can protect individual iles and olders. Let's see how Universal Shield cantake us to the next level o security by helping us protect individual iles and olders.
B Y D O L W I N F E R N A N D E S B
r i j e s h G a j j a r
STEP 1
DOWNLOAD AND INSTALL
UNIVERSAL Shield is a shareware and can be evaluated or 30 days. This application can bedownloaded rom the link www.everstrike.com/download/ushield.exe Once downloaded, run thesetup fle and ollow the steps below.
Double-click the setup1.
ile, select the language as
required and click 'Next'.
Agree with the terms and2.
conditions by selecting
the checkbox and click
'Next' to continue.
You would require3.
entering a password to
protect the sotware
rom being misused.
Enter the password or
the application and click
'Next'.
Click 'Browse4. ' and select
an appropriate older to
install the application.Clicking the 'View5. ' button
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
WHAT IS UNIVERSAL
SHIELD?
At times you might require
sharing your PC with dierent
users. For security purposes,
you can create separate user
accounts. But what i the userhas to use the main account
or some or the other reason?
By allowing the user access
to the main, you might put
confdential inormation at
stake. Hence or additional
security, Universal Shield
can come in handy. Using
this application, you can
password protect fles, olders
or an entire group o fles o a
particular fle type. Moreover,
you can also hide drives andprevent access to certain
objects like the Control Panel
and My Documents.
CHANGE THE MAIN
PASSWORD
It is a good practice to change
the main password o any
application requently. While
installing Universal Shield, you
were asked to enter the mainpassword or the application
so as to protect the application
itsel rom being misused.
Also, the main password would
be required i a user tries to
uninstall the application.
You can change this
main password as and when
required. To do so, ollow the
steps below.
Run the application[1]
and select the 'Change
password' option rom the
'Security' menu.
On the resulting screen,[2]
enter the current
password and the new
password.
Confrm the new[3]
password.
Click 'OK [4] ' to save changes.
REFERENCE
CHIP PLUS TIP
STEP 2
USING UNIVERSAL SHIELD
ONCE the installation has been completed, you can now set permissions or fles and olders,encrypt fles and lock them. Let's take a look at how to go about this.
To hide a ile or older,1.
run application and
click the 'Hide iles'
radio button.
Click 'Next2. ' and 'I want
to hide a ile' or 'I want
to hide a older' radio
button.
On the next window, click 3.
the 'Add to list' button
and browse or iles or
olders to be hidden.Click 'Next4. ' and then
'Finish'.
To hide an entire drive5.
select the 'I want to hide a
disk' radio button.
To hide a group o iles,6.
click the irst radio button
and then click 'I want tohide a group o iles using
masking'.
On the next screen, click 7.
'Add to list' and enter the
mask symbol. For eg. to
hide Word iles, enter
'.doc' and click 'Finish'.
You can also set iles as8.
read only. To do so, on themain interace, click 'Set
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
Internet connection
WHAT YOU CAN LEARN
Change your password
Block contacts
Customize privacy
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Staying safe on
FacebookWith all the good things we have on Facebook,there's a air share o threats that can make lie onthe website quite diicult. Here we will see somebasic steps to protect yoursel rom possible attacks.
B Y G A R E T H M A N K O O H
e m a l i L i m b a c h i y a
STEP 1
PICKING A STRONG PASSWORD
THOUGH Facebook has its share o precautionary measures to keep your privacy intact, thereare always a bunch o hackers who are a step urther than your protectors. Hence it is importantto strengthen the frst level o security to keep away the most common threat o all: hackers. Forthis to be made possible, the attacker should have your password, using which he can log intoyour account and do all the damage he wants. So picking a good password, that's hard to guess,is always important. The ollowing step will help you reset your password to a stronger one, i youeel that your current password isn't strong enough,
Log into your Facebook 1.
account using your
current ID and password.
Once you are on your2.
home page click 'Settings'
on the top bar.
By deault you will be3.
directed to the 'Settings'
tab. Under this, look or
the 'Password' section and
click 'Change'.
You will be asked to enter4.your old password once
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
STEP 2
KEEPING A TAB ON YOUR PRIVACY
THOUGH it may seem as a very sae platorm to maintain your contacts, Facebook has its shareo villains who may act as harmless members. They can use your images, videos and personalinormation to tarnish your image or or their own personal gain. The ollowing steps help youensure that you have complete protection to your privacy.
SECURITY QUESTION
Like most other sites that
require you to create a login
ID and password, Facebook
too has a special section
that requires you to enter
a security question. Theimportance o this question is
oten undermined since it is
rarely required. However, this
misconception can get us into
serious trouble i our account
has been hacked into or i we
have orgotten the password
that we had set.
Facebook's administrators
can help us get our lost
or stolen account back i
we remember the security
question. There is a way to setthis question. Make sure that
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
RECEIVE FREE PHONE
NOTIFICATIONS
There may be times when you
cannot access your Facebook
account. Taking advantage
o this situation, certain
pranksters or other nuisancesmay resort to posting some
rather lewd comments on
your recent activity. You can
keep track o all this activity
by subscribing to cell phone
notifcations. With this you can
be well aware o what people
are posting on your Wall as
well as the comments posted
on your activity.
Follow these steps to
activate these notifcations:
Click 'Settings[1] ' on yourFacebook profle.
Click the 'Mobile[2] ' tab.
Click 'Register or[3]
Facebook Mobile Texts'.
A dialog box will appear[4]
within your browser.
Select the name o your
country and the carrier
(network service provider)
that you use.
Click 'Next[5] '.
You will receive a message:[6]
'Using your mobile phone,send a text message
containing only the letter
'' (without quotes) to
********** (**FACEBOOK).*'
Click 'Next[7] '.
You will receive an[8]
activation code which you
will need to enter into the
textbox provided.
Click 'Confrm[9] '.
CHIP PLUS TIP
STEP 3
BLOCKING CERTAIN CONTACTS
FIRSTLY it is important to ensure that you do no upload photographs that could be misused in thehands o random people across Facebook. Do not upload obscene or personal photographs sincethey may entice suspects to portray a wrong image o you on the Internet. I you are still on thepage rom the previous step then carry out the ollowing,
Click 'Edit Photo Albums1.
Privacy Settings'.
You will see the albums2.
that you have uploaded.
Select who you wish to
share these albums with.
To set customized settings3.
click 'Customize'.
A dialog box will appear4.
on your screen that will
display the similar privacyoptions or your photo
albums in addition to a
section called 'Except
These People'.
Enter the names o 5.
contacts in your riends
list. The name will
appear as you type it
by a character match.
Simply click the name o the contact and it will be
added to the list o entries
or which that particular
album will be blocked.
Once you are done6.
speciying your settings
click 'Okay'
Click 'Save Settings7. ' to
inalize your changes.Click the 'Privacy8. ' link on
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
STEP 4
BLOCKING SEARCHES AND APPLICATIONS
FACEBOOK has some very helpul applications and games that are quite addictive as well as un.Some o these applications retrieve inormation rom your profle such as your images and personaldata. This can cause some personal inormation to land up at in the hands o the wrong people.However, at the same time, our personal inormation can be mined out rom search engines thatscan through Facebook. Hence it is necessary that we ollow these steps to keep our profles awayrom such problems.
REMOVE FRIENDS FROM
YOUR LIST
I you are being harassed by
someone on your list you can
block them by ollowing the
procedure described in 'Step 3'
o this story or you can simplyremove them rom your list.
There is however a dierence
in what happens ater each o
these steps. Simply removing
contacts rom your Facebook
riend list still gives them the
liberty to add you again or
send you messages. Blocking,
on the other hand, ensures
good riddance o your
problems.
To remove a contact, simply
visit the profle o the contactby looking him/her up rom
the 'Search' textbox. Scroll
down to the bottom o the
contact's profle till you spot
the 'Remove rom Friends'
link. Click this link to remove
the contact rom your list and
confrm your actions.
CHANGE YOUR IDENTITY
It is quite simple to change
your identity on Facebook i atall you eel that you are stalked
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SKILL LEVEL
Intermediate
WHAT YOU WILL NEED
Internet connection
An infected pen drive
WHAT YOU CAN LEARN
Formatting your pen
drive
Getting rid of infections
HOW LONG IT WILL TAKE
T45 Minutes
KEY DETAILS
Handling infected
pen drivesIt has always been a constant threat to copy datarom a pen drive that has been used on an inected PC. We teach you how to keep sae rom inected pen drives.
B Y G A R E T H M A N K O O B r i j e s h G a j j a r
STEP 1
FORMATTING USING LINUX
THERE are several means o ormatting your pen drive without letting the virus inect your PC. Themost popular technique is to ormat it using operating systems other than Windows, such as Linux.
STEP 2
TACKLING THE INFECTED 'AUTORUN.INF' FILE
VIRUSES oten travel across computers on USB drives by taking the orm o the 'autorun.in' fle. This fle is used to launch the 'Autorun' dialog box when the pen drive is inserted into the USB port.Once inected by such a virus, a copy o the same is made on all drives o the aected PC. Everytime the drive is inserted, the virus is executed. Hence it is best to prevent the 'Autorun' eature inthe frst place. Ater doing that we will see some tools that can help avoid inections.
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
DISABLE USB PORT
FROM BIOS
I you do not want your
USB port to be used in your
absence you can simply
disable it by tweaking a ew
BIOS settings. Simply restartyour computer and press the
[Del] key to go to your BIOS
setup. Once in the BIOS setup
simply go through the menus
and look or the option that
lets you disable the USB port
rom BIOS. This is mostly under
the 'Integrated Peripherals'
section. Simply set this as
'Disabled' and save your
settings beore quitting so
that the changes take eect.
Adding a BIOS password aterthat can also help.
You can also disable the
port rom Windows by right-
clicking on 'My Computer' and
selecting 'Manage' rom the
context menu. Look or 'Device
Manager'. Make sure that
you disable all the 'Universal
Serial Bus Controllers' in the
list by right-clicking them and
selecting 'Disable'.
CHIP PLUS TIP
STEP 3
FORMATTING USING DOS
JUST like we had removed the inection with the help o Linux, we can do the same with the helpo DOS. However, this process is more diagnostic in nature. It is best to use it when you are sure thatthe inection is already in your PC. Here's how to go about it,
Ater detecting an1.inection in your pen drive
restart your computer.
Keep pressing [F8] during2.
the boot-up process.
From the menu that3.
comes up, select the 'Sae
Mode with Command
Prompt' option using
your arrow keys and press
[Enter].
In the DOS prompt type4.'C:' and press [Enter].
To display iles that are5.
hidden type in 'DIR /AH'
and hit [Enter]. I you do
not see the ile called
'autorun.in' then your
system is not inected.
I you do then type in6.
'TYPE autorun.in' in thenext line and hit [Enter].
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
Help! I do not want
Windows Firewall
+ CONFIGURINGWINDOWS FIREWALL
PROBLEM:
I had earlier disabled Windows Firewall
on my Windows XP system because I
ound it quite annoying. However, I have
been advised that it is quite an important
tool and that it will help in maintaining
a frst level o security or my computer.
How do I enable it again and reconfgure
it to unction normally? Also, I would
like to know how to add programs to the
'exception list' o the frewall so that it
doesn't block these applications without
my permission in the uture.
SOLUTION:
One o the main reasons we have
people disabling Windows Firewall is its
intererence with certain, commonly-used
applications. In act, some applications
even advise users to disable Windows
Firewall or their smooth unctioning.
This does pose a threat or those who do
not have any other security applications
or anti-virus suites installed on their
systems; since Windows Firewall is the
deault, frst level security provided by
Microsot or its operating systems.
It is best advised not to disable the
frewall but rather confgure it to suit
your needs. This also includes adding
requently used applications to the
exception list o frewalls so that it doesn't
interere with their smooth unctioning
anymore. Follow these steps to
reconfgure Windows Firewall and create
an exception list:
Make sure that you are logged into the
administrator account on your computer.
Windows Firewall can be handled by
administrators only. Guest accounts do
no have access to its settings by deault.
Click 'Start | Run'.1.
In the textbox, type in 'wscui.cpl2. '
and click 'OK'.
The 'Windows Security Center3. '
window will open up.
Click the 'Windows Firewall4. ' logo
at the bottom under the 'Manage
security settings or:' section.
The 'Windows Firewall5. ' window
will open up. Click the 'On
(recommended)' radio button to
enable your irewall again.
Make sure that the 'Don't allow6.
exceptions' checkbox is not
checked.
Click 'OK'.7.
This step will enable the previously
disabled frewall. Now i you want to
add exceptions to the frewall so that
it doesn't block any application in the
uture, ollow these steps:
Follow the above procedure to open1.
up the 'Windows Firewall' window.
Once it opens up click the 'Exceptions2. '
tab.
In this, click the 'Add Programs3. ' tab.
A list o programs will be displayed4.
in the next dialog box that appears.
Select the name o any application
that you use requently or one that is
oten blocked by Windows Firewall.
I you cannot ind the name o the
program in the list o applications,
click 'Browse' and manually locate it.
Click 'OK 5. ' once you're done.
Now run the application to check i
Windows Firewall still intereres with it.
I you still experience problems with the
application running then you will have to
resort to the cumbersome procedure o
disabling Windows Firewall while using
Windows Firewall is a great security application, however there are times when this helpul tool can turn hostileagainst us and bring out problems rather than solutions.
B Y G A R E T H M A N K O O
S a c h
i n P a n d i t
When you open the Windows Security Center window, you are notificed if the firewall is 'ON' or 'OFF'. Click the 'Windows
Firewall' logo to open up the firewall settings dialog box.
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
it and then enabling it again once
you're done.
It's better to get yoursel a complete
third party frewall that is compatible
with your application.
You may also need to add a port to
the list o allowed exceptions. Reer to
the next problem or an elaboration on
the same.
+ ADDING PORTEXCEPTIONS
PROBLEM:
I have Windows Firewall enabled on my
PC but because o this certain ports are
blocked. A sotware application I use does
not work, since it requires a particular
port to be opened. Does Windows
Firewall have a provision to allow only
particular ports to be enabled? How can I
tell which ports are being used?
SOLUTION:
Yes, Windows Firewall allows you to
speciy individual ports that can be
accessed by third party applications
even when it is running. However, to
address this problem you need to frst
determine which ports are required by
the application that you're running.
There are a couple o means by
which you can fnd out which o the
ports (which are normally blocked by
Windows Firewall) are needed to be
opened. You can contact your program
vendor or assistance on which ports
should be enabled or use a simple DOS
command to fnd out which ports are
being accessed. Follow these steps or
the same:
Launch the application that's1.
causing you problems.
Click 'Start | Run'.2.
Type in 'command3. ' and hit [Enter].
In the command prompt enter 'netstat4.
-ano > netstat.txt'.
Hit [Enter].5.
Similarly, enter 'tasklist > tasklist.txt6. '
Open both the iles, 'Tasklist.txt7. '
and 'Netstat.txt' rom the location
speciied in the DOS prompt.
In the 'Tasklist8. ' ile, look or the name
o the program that was causing
problems. Beside it, you will notice
the column that enlists the PID (port
identiier) that it uses. In this example
(below), you will see that it is a
program called 'myprog.exe' and that
the PID is 680.
Look or the similar PID in the 'Netstat9. '
ile. I the port numbers used is
more than or equal to 1024, then it
is evident that the application uses
more than just a single port. It pretty
much means that you will not be
able to resolve the issue by opening
individual ports.
I in the above steps, you notice that the
port number is lesser than 1024 then
carry with these steps to block individual
ports:
Click 'Start | Run'.1.
In the textbox, type in 'wscui.cpl2. ' and
click 'OK'.
In the 'Windows Security Center3. '
window that opens up click the
'Windows Firewall' logo at the bottom
under the 'Manage security settings
or:' section.
The 'Windows Firewall4. ' window
will open up. In this, click the
'Exceptions' tab.
Click 'Add Port'.5.
Type in the details o the port that6.
you got either rom your vendor or
by using the procedure above.
Click 'OK'.7.
The program should work ine now8.
even with Windows Firewall enabled
and running.
After clicking 'Add Program' a dialog box with a list of applications will appear on your screen. Click 'Browse' if youcannot find the application you are looking for.
Enter the name of the application, the port number and the type of protocol (TCP/UDP)
and click 'OK'.
Look for the common port identification number 'PID' in both the 'netstat' as well as the
'tasklist'. This will help you determine the port in the 'netstat' file.